US20080207220A1 - Methods, systems, and products for identity verification - Google Patents
Methods, systems, and products for identity verification Download PDFInfo
- Publication number
- US20080207220A1 US20080207220A1 US11/710,319 US71031907A US2008207220A1 US 20080207220 A1 US20080207220 A1 US 20080207220A1 US 71031907 A US71031907 A US 71031907A US 2008207220 A1 US2008207220 A1 US 2008207220A1
- Authority
- US
- United States
- Prior art keywords
- location information
- identity
- historical
- verification
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000012795 verification Methods 0.000 title claims abstract description 143
- 238000000034 method Methods 0.000 title claims abstract description 27
- 238000004590 computer program Methods 0.000 claims description 8
- 230000007423 decrease Effects 0.000 claims description 5
- 238000004891 communication Methods 0.000 description 17
- 230000008569 process Effects 0.000 description 8
- 230000001413 cellular effect Effects 0.000 description 4
- 230000002354 daily effect Effects 0.000 description 2
- 230000002349 favourable effect Effects 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000005259 measurement Methods 0.000 description 2
- 230000008520 organization Effects 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- RYGMFSIKBFXOCR-UHFFFAOYSA-N Copper Chemical compound [Cu] RYGMFSIKBFXOCR-UHFFFAOYSA-N 0.000 description 1
- 241001522296 Erithacus rubecula Species 0.000 description 1
- 230000001133 acceleration Effects 0.000 description 1
- 230000006978 adaptation Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000000981 bystander Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 229910052802 copper Inorganic materials 0.000 description 1
- 239000010949 copper Substances 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000003203 everyday effect Effects 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- VIQCGTZFEYDQMR-UHFFFAOYSA-N fluphenazine decanoate Chemical compound C1CN(CCOC(=O)CCCCCCCCC)CCN1CCCN1C2=CC(C(F)(F)F)=CC=C2SC2=CC=CC=C21 VIQCGTZFEYDQMR-UHFFFAOYSA-N 0.000 description 1
- 238000003384 imaging method Methods 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 238000007620 mathematical function Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 229920001690 polydopamine Polymers 0.000 description 1
- 210000001525 retina Anatomy 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/126—Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/63—Location-dependent; Proximity-dependent
Definitions
- the exemplary embodiments generally relate to communications and, more particularly, to location monitoring.
- Identity theft is a problem. Each year identity fraud costs consumers and merchants billions of dollars.
- Conventional schemes to verify identity require knowledge information (e.g., usernames and passwords), physical attributes (e.g., fingerprint match, retina match, or other biometric measures), or physical possession (e.g., car keys). These conventional approaches are well known and are commonly referred to as verification using “what you know,” “what you are,” and “what you have.” Because identity theft is, unfortunately, almost routinely common, additional measures of identity could be enormously beneficial. What is needed, then, are methods, systems, and products that describe a new paradigm in identity verification.
- the exemplary embodiments provide methods, systems, and products for verifying a person's identity.
- Exemplary embodiments utilize location to verify a person's identity. That is, exemplary embodiments verify a person's identity based on recurring patterns of movement. Because most people have a recurring commute to work, school, or other destination, exemplary embodiments use these recurring travel patterns to verify a person's identity. Most people are creatures of habit, including the everyday places we visit, such as work, restaurants, and shopping. Exemplary embodiments thus obtain location information that describes our daily travels. This location information (such as GPS information) may be obtained from wireless phones, laptop computers, automotive control modules, electronic PDAs, and any other devices. Whenever identity verification is needed, exemplary embodiments compare recent location information to historical location information.
- exemplary embodiments may verify the identity of the user of the device.
- the comparison is unfavorable, the user may need to present a driver's license or other proof of identity.
- Exemplary embodiments thus authenticate users based on location. Embodiments, at least some respects, might be referred to as utilizing “where you have been” and any information related to “where you have been.”
- Exemplary embodiments include a method for identification verification.
- Location information is acquired.
- the location information is compared to historical location information.
- the location information favorably compares to the historical location information, then an identity associated with the location information is verified.
- More exemplary embodiments include a system for verifying a user's identity.
- Location information is acquired.
- the location information is compared to historical location information.
- the location information favorably compares to the historical location information, then an identity associated with the location information is verified.
- Location information is acquired.
- the location information is compared to historical location information.
- the location information favorably compares to the historical location information, then an identity associated with the location information is verified.
- FIG. 1 is a schematic illustrating an operating environment in which exemplary embodiments may be implemented
- FIGS. 2 & 3 are schematics illustrating a process of verifying a user's identity, according to more exemplary embodiments
- FIG. 4 is a schematic illustrating another process of verifying a user's identity, according to even more exemplary embodiments
- FIG. 6 is a schematic illustrating presentation of an identity verification rating, according to still more exemplary embodiments.
- FIG. 7 is a schematic illustrating an alternative, centralized operating environment, according to more exemplary embodiments.
- FIG. 8 depicts other possible operating environments for additional aspects of the exemplary embodiments.
- FIG. 9 is a flowchart illustrating a method of verifying identity, according to even more exemplary embodiments.
- first, second, etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first device could be termed a second device, and, similarly, a second device could be termed a first device without departing from the teachings of the disclosure.
- FIG. 1 is a schematic illustrating an environment in which exemplary embodiments may be implemented.
- a user's device 20 communicates with a verification server 22 via a communications network 24 .
- the device 20 may be a computer, a radio, a personal digital assistant (PDA), a cordless/cellular/IP phone, digital music player, or any other processor-controlled device.
- PDA personal digital assistant
- the user's device 20 communicates location information 26 to the verification server 22 .
- a location system 28 determines or monitors a current location 30 of the user's device 20 .
- the location system 28 communicates the location information 26 to the verification server 22 , and the location information 26 describes the current location 30 associated with the user's device 20 .
- the verification server 22 When the verification server 22 receives the location information 26 , exemplary embodiments verify the identity of the user of the device 20 based on the location information 26 .
- the verification server 22 has a processor 32 (e.g., “UP”), application specific integrated circuit (ASIC), or other similar device that executes a verification application 34 stored in memory 36 .
- the verification application 34 is a set of processor-executable instructions that verify the identity of the user of the device 20 , based on historical location information and/or patterns of movement.
- the location information 26 may be stored in a database 38 of location information.
- the database 38 of location information is illustrated as being locally stored in the memory 36 of the verification server 22 , yet the database 38 of location information may be remotely accessible via the communications network 24 .
- the database 38 of location information historically stores or tracks location information for the user's device 20 .
- the database 38 of location information may store location information for the previous hour, for the current day, for the past month, for the past year, or for any interval or length of time desired.
- the database 38 of location information thus provides the verification application 34 with data to completely analyze historical location information of the user's device 20 .
- the database 38 of location information also allows the verification application 34 to analyze a series or chronological series of location information, or movements, of the user's device 20 .
- location information may include any information related to location.
- Location information may describe a current location, a past location, and one or more sequences of locations.
- Location information may include sets of two or more locations that may be associated in any way (e.g., schools, residences of neighbors, malls, theaters, parks, stores, and chains of stores).
- Location information may describe any time spent at particular locations, such as past locations, movement patterns, or any aspects of movement patterns.
- Location information may even include any information derived from location and/or time measurements, such as velocity (changes in location over time) and acceleration (changes in velocity over time).
- Location information may further include one or more sequences of locations.
- the location information may describe a movement, travel pattern, or route observed over time.
- Location information may also include sets of two or more locations, and those locations may be associated (for example, schools, neighbors, residences, stores, and store chains such as HOME DEPOT® and TARGET®).
- Location information may even include time parameters, such as the time spent at a particular location, including past locations.
- the identity of the user may be verified using the location information 26 .
- the verification application 34 queries the database 38 of location information for recent and/or for historical location information. The verification application 34 then compares recent location information 40 to historical location information 42 . When the recent location information 40 favorably compares to the historical location information 42 , then the verification application 34 may verify the identity of the user of the device 20 . Because the user's recent movements match historical location information, the verification application 34 may assume that the user is the historical user of the device 20 . That is, the user is moving or traveling as expected because the device 20 is not sending new or unrecognized location information 26 . Because the recent location information 40 matches historical data, there is a higher probability that the current user is the same person that accumulated the historical location information 42 .
- Exemplary embodiments verify a user's identity based on location.
- Many people have repeatable travel patterns and/or destinations.
- the user may make a daily commute to/from work, school, or shopping.
- the user may frequently or repeatedly visit a relative, friend, restaurant, or business.
- the user may have a regular jogging route or exercise course.
- Whatever the destination or route, when that corresponding location information is received, the user is making the same travels as historically observed. There is thus a higher probability that the current user is the same historical user that accumulated the historical travels, and so the identity of the current user may be verified.
- exemplary embodiments may decline to verify the identity of the user of the device 20 .
- the device 20 is not traveling as historically observed, so the identity of the current user may or may not match the historical user.
- the verification application 34 may be completely configured to determine favorable and unfavorable comparisons.
- Exemplary embodiments may utilize any location system.
- the location system 28 may utilize any technique for obtaining the current location 30 of the user's device 20 , such as triangulation and/or global positioning system information. While the location system 28 is shown residing or operating in the user's device 20 , the location system 28 may optionally operate within the verification server 22 . Moreover, the location system 28 may alternatively or additionally be a service provided by a separate server and accessible via the communications network 24 . Further, the location system 28 may alternately or additionally be an external system such as based on one or more cameras and/or other sensors appropriately situated and configured to recognize the user and/or the device 20 and/or one or more associated or associable objects. Because, however, location systems are well known to those of ordinary skill in the art, no further discussion is made.
- the verification server 22 is only simply illustrated. Because the architecture and operating principles of the verification server 22 are well known, its hardware and software components are not further shown and described. If the reader desires more details, the reader is invited to consult the following sources, all incorporated herein by reference in their entirety: A NDREW T ANENBAUM , C OMPUTER N ETWORKS (4 th edition 2003); W ILLIAM S TALLINGS , C OMPUTER O RGANIZATION AND A RCHITECTURE : D ESIGNING FOR P ERFORMANCE (7 th Ed., 2005); and D AVID A. P ATTERSON & J OHN L. H ENNESSY , C OMPUTER O RGANIZATION AND D ESIGN : T HE H ARDWARE /S OFTWARE I NTERFACE (3 rd . Edition 2004 ).
- the communications network 24 may be a cable network operating in the radio-frequency domain and/or the Internet Protocol (IP) domain.
- the communications network 24 may also include a distributed computing network, such as the Internet (sometimes alternatively known as the “World Wide Web”), an intranet, a local-area network (LAN), and/or a wide-area network (WAN).
- the communications network 24 may include coaxial cables, copper wires, fiber optic lines, and/or hybrid-coaxial lines.
- the communications network 24 may even include wireless portions utilizing any portion of the electromagnetic spectrum and any signaling standard (such as the I.E.E.E. 802 family of standards, GSM/CDMA/TDMA or any cellular standard, and/or the ISM band).
- the concepts described herein may be applied to any wireless/wireline communications network, regardless of physical componentry, physical configuration, or communications standard(s).
- FIGS. 2 and 3 are schematics illustrating a process of verifying a user's identity, according to more exemplary embodiments.
- the verification application 34 may calculate a score when comparing the recent location information 40 to the historical location information 42 .
- the verification server 22 may first receive a request to verify an identity (Step 50 ).
- the request may originate from any person, such as a third party restaurant, business, or other merchant that wishes to verify the user of the device 20 .
- the request additionally or alternatively, may be automatically generated by the device 20 and/or the verification server 22 to enable or ensure periodic verifications and/or to ensure that recent verifications are always available.
- the verification application 34 may query for recent and/or historical location information (Step 52 ).
- the verification application 34 may send a request for updated location information (Step 54 ).
- the device 20 responds and sends current or recent location information (Step 56 ).
- the verification application 34 compares the recent location information to the historical location information (Step 58 ).
- the verification application 34 accesses a scoring algorithm (Step 60 ).
- the scoring algorithm numerically evaluates how well the recent movements of the device 20 match the historical location information, as defined by the scoring algorithm.
- the scoring algorithm may be any simple or complex formula, relationship, pattern matching process, string equation, or logical comparison.
- the scoring algorithm may have any structure and/or language, such as MathML or OpenMath.
- the third party requestor may supply the scoring algorithm in the form of mobile executable code (e.g., Java byte code). The third party requestor may thus specify the scoring algorithm, thus allowing the requestor to determine how strictly the current user's identity is verified.
- the complexity of the third party's scoring algorithm may be restricted to not substantially hinder the performance of the verification application 34 or the verification server 22 itself. So the verification application 34 may inspect the scoring algorithm and estimate its complexity. The verification application 34 may measure the bit or byte length of the scoring algorithm and compare to a threshold size. The verification application 34 may inspect the scoring algorithm for terms, mathematical operations/operands, or mathematical functions that indicate complexity. If such indicators are found, the verification application 34 could reject the third party's scoring algorithm. The verification application 34 may even utilize multiple scoring algorithms and select one or more of the outcomes.
- the verification application 34 calculates a score (Step 62 ).
- the score is a measure of identity. If multiple scoring algorithms are used, a score may be calculated for each algorithm. The best score(s) may be chosen for identity verification, or the multiple scores may be combined and/or weighted to produce an overall, final score.
- the verification application 34 may compare the score(s) to one or more threshold scores (Step 64 ).
- the threshold score may represent a necessary score at which the identity of the user may be verified. When the recent movements match the historical location information, then the score may indicate the user matches the historical user. If there is little or no difference between the recent movements and the historical location information, then the threshold score may be satisfied and the identity of the user is verified (Step 66 ). When the location information unfavorably compares to the historical location information, then the threshold score may not be satisfied and the verification application 34 may decline to verify the identity of the user of the device (Step 68 ). The verification application 34 may then send a message to the device 20 that verifies, or fails to verify, the identity of the user (Step 70 ). The verification application 34 may additionally or alternatively send the message to the third party requestor.
- the threshold score may be configurable.
- the threshold score represents some configurable score that is required to verify the identity of the user.
- the threshold score is preferably stored in the memory 36 of the verification server 22 , but the threshold score may be remotely accessed (via the communications network 24 shown in FIG. 1 ).
- the threshold score may even be supplied by the verification requestor (e.g., a third party merchant).
- a user of the device 20 may establish a strict threshold score so that even slight variations (between the recent movements and the historical location information) result in a failed verification.
- a more lax threshold score may verify the user despite location differences.
- the third party requestor may specify a strict threshold score to reduce the chances of fraudulent purchases, transactions, and other activities.
- the set of rules defines how recent location information is compared to the historical location information.
- the set of rules may be stored in the memory 36 of the verification server 22 , yet the set of rules may be remotely accessed (via the communications network 24 shown in FIG. 1 ).
- the set of rules may also be supplied by the verification requestor (e.g., attached to or specified by the verification request illustrated as Step 80 in FIG. 4 ).
- the set of rules may establish a logical comparison of location information for one or more different intervals of time. Location information is retrieved for each specified interval of time, and then the location information is compared.
- the verification application 34 may compare individual locations (or “waypoints”), or the verification application 34 may compare routes (e.g., a series of locations or waypoints).
- the verification application 34 may additionally or alternatively compare the time spent at locations and/or en routes. Whatever interval(s) of time are specified, the verification application 34 gathers the corresponding location information, according to the set of rules.
- the set of rules may also specify particular dates.
- the set of rules may specify that location information for Monday and Tuesday is compared with the previous two weeks of historical location information.
- the set of rules may specify that location information for Monday and Tuesday is compared to historical location information for each Monday and Tuesday during the previous six months.
- the set of rules may specify that location information for today from noon to 6 PM is compared to historical location information for each previous noon to 6 PM over the last four months.
- the set of rules in short, may specify different intervals of time by date(s).
- the set of rules may also specify a strict or lax comparison.
- the set of rules may specify that the same location must be observed in all specified intervals of time.
- the set of rules may more strictly require that the same location be observed at the same or nearly same time in each interval of time.
- the set of rules may strictly require the same route (e.g., the same series of location information) be observed for each interval of time. If the user historically takes the same route, then the set of rules may specify that that same route be observed to verify the user's identity. If the user historically has the same historical location information for each Tuesday of the previous months, then the set of rules may require that same location information on any Tuesday in order to verify the user's identity.
- the set of rules may specify acceptable variation in location information. When the current location information is compared to the historical location information, the set of rules may limit how much difference is acceptable.
- the set of rules may strictly require an exact match in location information, within the accuracy of the location system (shown as reference numeral 28 in FIG. 1 ).
- the set of rules may even strictly require an exact match in location information and in the time of each observed location. An exact match requirement, however, may result in excessive denials of identity.
- the set of rules may specify a threshold radius of variation, in which current location information may be approximately matched to the historical location information. If any location information is within the threshold radius of the historical location information, then the verification application 34 may verify the user's identity.
- the threshold radius of variation is completely configurable and may be pre-figured and/or specified by the user and/or the verification requestor.
- the set of rules, verification algorithms, and the threshold radius of variation may be made adaptable based on adaptation rules and parameters such as the month, week, day of week, time of day, frequency of verification requests, and/or frequency of verification denials.
- the set of rules may even define multiple logical comparisons and/or multiple scoring algorithms, and, according to embodiments, one or more must be matched or satisfied within the allowable threshold radius of variation. In some cases, for instance when employing multiple algorithms, multiple thresholds and/or multiple threshold radii of variation may be used.
- the set of rules may also access a geographical information system or database.
- geographical information may be used to augment that comparison.
- the verification application 34 may tolerate more variation in location information when the geographical information indicates hilly, forested, or even mountainous terrains. In such terrains, for instance, GPS location fixes may sometimes suffer in accuracy due to increased difficulty of receiving the required GPS satellite signals.
- the location information may even be more accurate in some terrains than in others, so the set of rules may require greater accuracy in some terrains.
- the geographical information may be stored in the memory 36 of the verification server 22 , or the geographical information may be remotely stored in a remote database and accessed via the communications network 24 . Geographical information, then, may be used to help compare location information and overcome or evaluate ambiguities, errors, and imprecision.
- FIG. 5 is a schematic illustrating exceptions, according to even more exemplary embodiments.
- exemplary embodiments may automatically decline to verify a user.
- the verification application 34 may query a database 100 of exceptions for the location information 26 .
- the database 100 of exceptions stores forbidden location exceptions 102 for which verification is immediately and automatically denied. That is, if the location information 26 matches any entry in the database 100 of exceptions, then the user and/or the requestor requires immediate denial of identity verification.
- the database 100 of exceptions thus stores location information for which a legitimate, verified user would never be found/observed. Pornographic stores, private clubs, restricted access locations, remote islands, or any other locations at which the user should not be observed.
- the verification application 34 receives an affirmative response from the database 100 of exceptions, then the verification application 34 denies identity verification.
- the verification application 34 calculates velocity and receives an affirmative response from the database 100 of exceptions, then the verification application 34 may deny identity verification.
- FIG. 6 is a schematic illustrating presentation of an identity verification rating, according to still more exemplary embodiments.
- the verification application 34 scores the user's identity (based on location)
- the verification application 34 sends that score and/or an appropriately calculated rating based on that score to the user's device 20 .
- the verification application 34 retrieves a set 120 of rules and compares the recent location information 40 to the historical location information 42 .
- the verification application 34 may access the scoring algorithm 122 , calculate a score 124 , and compare the score 124 to the threshold score 126 .
- the verification application 34 then sends the score 124 to the user's device 20 .
- the rating may be determined from the score if, for example, the scale of the score varies by algorithm.
- the score or rating may be scaled or configured to be within the range of “0” to “100,” with greater numbers having more confidence.
- the user's device 20 presents an identity verification rating 128 .
- the identity verification rating 128 is illustrated as an icon or notification that is visually presented on a display device 130 of the user's device 20 , yet the identity verification rating 128 may also have audible features.
- the user's device 20 has a processor 132 (e.g., “ ⁇ P”), application specific integrated circuit (ASIC), or other similar device that executes a client-side verification application 134 stored in memory 136 .
- the client-side verification application 134 is a set of processor-executable instructions that cooperate with the verification application 34 (operating in the verification server 22 ) to verify the identity of the user of the device 20 .
- the client-side verification application 134 instructs the processor 132 to receive the score 124 and to present the identity verification rating 128 .
- the identity verification rating 128 may be a numerical presentation or bar graph of the score 124 (e.g. a probability or confidence level).
- the identity verification rating 128 may be a simple “green” icon that indicates the user has been verified.
- a “red” icon may indicate that the current user is an imposter and that verification is or should be denied.
- the “red” icon may be accompanied by an alert, such as an audible chirp or siren sound, flashing beacon, and/or loud synthesized voice declaration (such as “This device has been stolen; bystanders please notify the police at once!”).
- the identity verification rating 128 may be any graphical, audible, or visual indicator of the user's identity verification.
- the identity verification rating 128 may be proof of identity. Because the identity verification rating 128 is visually produced at the user's device 20 , the user may thus present the device 20 as verification of identity. Whenever a merchant, for example, requires identity verification, the user may simply and quickly produce the device 20 with the identity verification rating 128 presented on the display device 130 . The identity verification rating 128 may even additionally retrieve a name, address, and driver's license number from the memory 136 , and the identity verification rating 128 may additionally present this and/or any other suitable information. When the identity verification rating 128 is high, for example, the merchant may confidently accept the user's identity.
- the identity verification rating 128 may drop or change in value, so the merchant may be reluctant to verify the identity of the user. Additional identification, such as a physical driver's license or social security card, may then be desired and/or specifically required by the merchant.
- FIG. 7 is a schematic illustrating an alternative, centralized operating environment, according to more exemplary embodiments.
- the verification server 22 communicates with multiple user devices 150 via the communications network 24 .
- the verification server 22 also communicates with one or more third party requestor's devices 152 via the communications network 24 .
- the verification application 34 operates in the centralized verification server 22 .
- An instance of the client-side verification application 134 operates in each of the users' devices 150 .
- An instance of the client-side verification application 134 may also operate in the third party requestor's device 152 .
- the verification application 34 may continuously or periodically verify the identity of any user of the user devices 150 .
- the third party's corresponding device 152 may send a verification request 154 .
- the verification request 154 includes device information 156 that uniquely identifies the device for which identity verification is desired.
- the device information 156 may include a machine address code, a serial number, an Internet Protocol address, or any other alphanumeric combination.
- the verification application 34 queries the database 38 of location information for the current location information 40 and for the historical location information 42 .
- the database 38 of location information is illustrated as being remotely accessible via the communications network 24 .
- the verification application 34 compares the current location information 40 with the historical location information 42 and scores the user's identity (as explained with reference to FIGS. 1-6 ). The verification application 34 sends the score 124 to the corresponding user's device 20 and/or to the third party's requesting device 152 . The user's device 20 may then visually and/or audibly present the identity verification rating 128 , as above explained. The verification application 34 may additionally or alternatively send the score 124 to other devices associated with (or selected by) the historic user of the device 20 .
- FIG. 8 depicts other possible operating environments for additional aspects of the exemplary embodiments.
- FIG. 8 illustrates that the verification application 34 and/or the client-side verification application 34 may alternatively or additionally operate within various other devices 200 .
- FIG. 8 illustrates that the verification application 34 and/or the client-side verification application 34 may entirely or partially operate within a set-top box ( 202 ), a personal/digital video recorder (PVR/DVR) 204 , personal digital assistant (PDA) 206 , a Global Positioning System (GPS) device 208 , an interactive television 210 , an Internet Protocol (IP) phone 212 , a pager 214 , a cellular/satellite phone 216 , or any computer system and/or communications device utilizing a digital processor and/or a digital signal processor (DP/DSP) 218 .
- IP Internet Protocol
- DP digital signal processor
- the device 200 may also include watches, radios, vehicle electronics, clocks, printers, gateways, mobile/implantable medical devices, and other apparatuses and systems. Because the architecture and operating principles of the various devices 200 are well known, the hardware and software componentry of the various devices 200 are not further shown and described.
- FIG. 9 is a flowchart illustrating a method of verifying identity, according to even more exemplary embodiments.
- a request to verify the identity of a user of a device is received (Block 300 ).
- Location information for a device is acquired (Block 302 ).
- the location information is compared to historical location information (Block 304 ).
- a set of rules is applied that determines how strictly the location information is compared to the historical location information (Block 306 ). Any differences between recent movements and the historical location information are scored (Block 308 ).
- the score is compared to a threshold (Block 310 ). When the score favorably compares to the threshold, then verify that the recent movements of the user match the historical location information (Block 312 ). When the location information unfavorably compares to the historical location information, then decline to verify the identity of the user of the device (Block 314 ).
- a verification message is sent that verifies, or denies, the identity of the user (Block 316 ).
- Exemplary embodiments may be physically embodied on or in a computer-readable medium.
- This computer-readable medium may include CD-ROM, DVD, tape, cassette, floppy disk, memory card, and large-capacity disk (such as IOMEGA®, ZIP®, JAZZ®, and other large-capacity memory products (IOMEGA®, ZIP®, and JAZZ® are registered trademarks of Iomega Corporation, 1821 W. Iomega Way, Roy, Utah 84067, 801.332.1000, www.iomega.com).
- This computer-readable medium, or media could be distributed to end-subscribers, licensees, and assignees. These types of computer-readable media, and other types not mention here but considered within the scope of the exemplary embodiments.
- a computer program product comprises processor-executable instructions for verifying identity.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
- A portion of the disclosure of this patent document and its attachments contain material which is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent files or records, but otherwise reserves all copyrights whatsoever.
- The exemplary embodiments generally relate to communications and, more particularly, to location monitoring.
- Identity theft is a problem. Each year identity fraud costs consumers and merchants billions of dollars. Conventional schemes to verify identity require knowledge information (e.g., usernames and passwords), physical attributes (e.g., fingerprint match, retina match, or other biometric measures), or physical possession (e.g., car keys). These conventional approaches are well known and are commonly referred to as verification using “what you know,” “what you are,” and “what you have.” Because identity theft is, unfortunately, almost routinely common, additional measures of identity could be enormously beneficial. What is needed, then, are methods, systems, and products that describe a new paradigm in identity verification.
- The exemplary embodiments provide methods, systems, and products for verifying a person's identity. Exemplary embodiments utilize location to verify a person's identity. That is, exemplary embodiments verify a person's identity based on recurring patterns of movement. Because most people have a recurring commute to work, school, or other destination, exemplary embodiments use these recurring travel patterns to verify a person's identity. Most people are creatures of habit, including the everyday places we visit, such as work, restaurants, and shopping. Exemplary embodiments thus obtain location information that describes our daily travels. This location information (such as GPS information) may be obtained from wireless phones, laptop computers, automotive control modules, electronic PDAs, and any other devices. Whenever identity verification is needed, exemplary embodiments compare recent location information to historical location information. When the comparison is favorable, exemplary embodiments may verify the identity of the user of the device. When the comparison is unfavorable, the user may need to present a driver's license or other proof of identity. Exemplary embodiments thus authenticate users based on location. Embodiments, at least some respects, might be referred to as utilizing “where you have been” and any information related to “where you have been.”
- Exemplary embodiments include a method for identification verification. Location information is acquired. The location information is compared to historical location information. When the location information favorably compares to the historical location information, then an identity associated with the location information is verified.
- More exemplary embodiments include a system for verifying a user's identity. Location information is acquired. The location information is compared to historical location information. When the location information favorably compares to the historical location information, then an identity associated with the location information is verified.
- Other exemplary embodiments describe a computer program product for verifying a user's identity. Location information is acquired. The location information is compared to historical location information. When the location information favorably compares to the historical location information, then an identity associated with the location information is verified.
- Other systems, methods, and/or computer program products according to the exemplary embodiments will be or become apparent to one with ordinary skill in the art upon review of the following drawings and detailed description. It is intended that all such additional systems, methods, and/or computer program products be included within this description, be within the scope of the claims, and be protected by the accompanying claims.
- These and other features, aspects, and advantages of the exemplary embodiments are better understood when the following Detailed Description is read with reference to the accompanying drawings, wherein:
-
FIG. 1 is a schematic illustrating an operating environment in which exemplary embodiments may be implemented; -
FIGS. 2 & 3 are schematics illustrating a process of verifying a user's identity, according to more exemplary embodiments -
FIG. 4 is a schematic illustrating another process of verifying a user's identity, according to even more exemplary embodiments; -
FIG. 5 is a schematic illustrating exceptions, according to even more exemplary embodiments; -
FIG. 6 is a schematic illustrating presentation of an identity verification rating, according to still more exemplary embodiments; -
FIG. 7 is a schematic illustrating an alternative, centralized operating environment, according to more exemplary embodiments; -
FIG. 8 depicts other possible operating environments for additional aspects of the exemplary embodiments; and -
FIG. 9 is a flowchart illustrating a method of verifying identity, according to even more exemplary embodiments. - The exemplary embodiments will now be described more fully hereinafter with reference to the accompanying drawings. The exemplary embodiments may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. These embodiments are provided so that this disclosure will be thorough and complete and will fully convey the exemplary embodiments to those of ordinary skill in the art. Moreover, all statements herein reciting embodiments, as well as specific examples thereof, are intended to encompass both structural and functional equivalents thereof. Additionally, it is intended that such equivalents include both currently known equivalents as well as equivalents developed in the future (i.e., any elements developed that perform the same function, regardless of structure).
- Thus, for example, it will be appreciated by those of ordinary skill in the art that the diagrams, schematics, illustrations, and the like represent conceptual views or processes illustrating the exemplary embodiments. The functions of the various elements shown in the figures may be provided through the use of dedicated hardware as well as hardware capable of executing associated software. Those of ordinary skill in the art further understand that the exemplary hardware, software, processes, methods, and/or operating systems described herein are for illustrative purposes and, thus, are not intended to be limited to any particular named manufacturer.
- As used herein, the singular forms “a,” “an,” and “the” are intended to include the plural forms as well, unless expressly stated otherwise. It will be further understood that the terms “includes,” “comprises,” “including,” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. It will be understood that when an element is referred to as being “connected” or “coupled” to another element, it can be directly connected or coupled to the other element or intervening elements may be present. Furthermore, “connected” or “coupled” as used herein may include wirelessly connected or coupled. As used herein, the term “and/or” includes any and all combinations of one or more of the associated listed items.
- It will also be understood that, although the terms first, second, etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first device could be termed a second device, and, similarly, a second device could be termed a first device without departing from the teachings of the disclosure.
-
FIG. 1 is a schematic illustrating an environment in which exemplary embodiments may be implemented. A user'sdevice 20 communicates with averification server 22 via acommunications network 24. Although the user'sdevice 20 is generically shown, thedevice 20, as will be later explained, may be a computer, a radio, a personal digital assistant (PDA), a cordless/cellular/IP phone, digital music player, or any other processor-controlled device. Whatever the user'sdevice 20, the user'sdevice 20 communicateslocation information 26 to theverification server 22. As the user carries thedevice 20, alocation system 28 determines or monitors acurrent location 30 of the user'sdevice 20. According to exemplary embodiments, thelocation system 28 communicates thelocation information 26 to theverification server 22, and thelocation information 26 describes thecurrent location 30 associated with the user'sdevice 20. - When the
verification server 22 receives thelocation information 26, exemplary embodiments verify the identity of the user of thedevice 20 based on thelocation information 26. Theverification server 22 has a processor 32 (e.g., “UP”), application specific integrated circuit (ASIC), or other similar device that executes averification application 34 stored inmemory 36. According to exemplary embodiments, theverification application 34 is a set of processor-executable instructions that verify the identity of the user of thedevice 20, based on historical location information and/or patterns of movement. AsFIG. 1 illustrates, thelocation information 26 may be stored in adatabase 38 of location information. Thedatabase 38 of location information is illustrated as being locally stored in thememory 36 of theverification server 22, yet thedatabase 38 of location information may be remotely accessible via thecommunications network 24. Thedatabase 38 of location information historically stores or tracks location information for the user'sdevice 20. Thedatabase 38 of location information, for example, may store location information for the previous hour, for the current day, for the past month, for the past year, or for any interval or length of time desired. Thedatabase 38 of location information thus provides theverification application 34 with data to completely analyze historical location information of the user'sdevice 20. Thedatabase 38 of location information also allows theverification application 34 to analyze a series or chronological series of location information, or movements, of the user'sdevice 20. - According to exemplary embodiments, location information may include any information related to location. Location information, for example, may describe a current location, a past location, and one or more sequences of locations. Location information may include sets of two or more locations that may be associated in any way (e.g., schools, residences of neighbors, malls, theaters, parks, stores, and chains of stores). Location information may describe any time spent at particular locations, such as past locations, movement patterns, or any aspects of movement patterns. Location information may even include any information derived from location and/or time measurements, such as velocity (changes in location over time) and acceleration (changes in velocity over time). Location information may further include one or more sequences of locations. If a sequence is chronologically arranged, then the location information may describe a movement, travel pattern, or route observed over time. Location information may also include sets of two or more locations, and those locations may be associated (for example, schools, neighbors, residences, stores, and store chains such as HOME DEPOT® and TARGET®). Location information may even include time parameters, such as the time spent at a particular location, including past locations.
- The identity of the user may be verified using the
location information 26. According to exemplary embodiments, theverification application 34 queries thedatabase 38 of location information for recent and/or for historical location information. Theverification application 34 then comparesrecent location information 40 tohistorical location information 42. When therecent location information 40 favorably compares to thehistorical location information 42, then theverification application 34 may verify the identity of the user of thedevice 20. Because the user's recent movements match historical location information, theverification application 34 may assume that the user is the historical user of thedevice 20. That is, the user is moving or traveling as expected because thedevice 20 is not sending new orunrecognized location information 26. Because therecent location information 40 matches historical data, there is a higher probability that the current user is the same person that accumulated thehistorical location information 42. - Exemplary embodiments, then, verify a user's identity based on location. Many people have repeatable travel patterns and/or destinations. The user, for example, may make a daily commute to/from work, school, or shopping. The user may frequently or repeatedly visit a relative, friend, restaurant, or business. The user may have a regular jogging route or exercise course. Whatever the destination or route, when that corresponding location information is received, the user is making the same travels as historically observed. There is thus a higher probability that the current user is the same historical user that accumulated the historical travels, and so the identity of the current user may be verified. Conversely, when the
location information 26 unfavorably compares to thehistorical location information 42, then exemplary embodiments may decline to verify the identity of the user of thedevice 20. Thedevice 20 is not traveling as historically observed, so the identity of the current user may or may not match the historical user. As later paragraphs will explain, theverification application 34 may be completely configured to determine favorable and unfavorable comparisons. - Exemplary embodiments may utilize any location system. The
location system 28 may utilize any technique for obtaining thecurrent location 30 of the user'sdevice 20, such as triangulation and/or global positioning system information. While thelocation system 28 is shown residing or operating in the user'sdevice 20, thelocation system 28 may optionally operate within theverification server 22. Moreover, thelocation system 28 may alternatively or additionally be a service provided by a separate server and accessible via thecommunications network 24. Further, thelocation system 28 may alternately or additionally be an external system such as based on one or more cameras and/or other sensors appropriately situated and configured to recognize the user and/or thedevice 20 and/or one or more associated or associable objects. Because, however, location systems are well known to those of ordinary skill in the art, no further discussion is made. - The
verification server 22 is only simply illustrated. Because the architecture and operating principles of theverification server 22 are well known, its hardware and software components are not further shown and described. If the reader desires more details, the reader is invited to consult the following sources, all incorporated herein by reference in their entirety: ANDREW TANENBAUM , COMPUTER NETWORKS (4th edition 2003); WILLIAM STALLINGS , COMPUTER ORGANIZATION AND ARCHITECTURE : DESIGNING FOR PERFORMANCE (7th Ed., 2005); and DAVID A. PATTERSON & JOHN L. HENNESSY , COMPUTER ORGANIZATION AND DESIGN : THE HARDWARE /SOFTWARE INTERFACE (3rd. Edition 2004). - Exemplary embodiments may be applied regardless of networking environment. The
communications network 24 may be a cable network operating in the radio-frequency domain and/or the Internet Protocol (IP) domain. Thecommunications network 24, however, may also include a distributed computing network, such as the Internet (sometimes alternatively known as the “World Wide Web”), an intranet, a local-area network (LAN), and/or a wide-area network (WAN). Thecommunications network 24 may include coaxial cables, copper wires, fiber optic lines, and/or hybrid-coaxial lines. Thecommunications network 24 may even include wireless portions utilizing any portion of the electromagnetic spectrum and any signaling standard (such as the I.E.E.E. 802 family of standards, GSM/CDMA/TDMA or any cellular standard, and/or the ISM band). The concepts described herein may be applied to any wireless/wireline communications network, regardless of physical componentry, physical configuration, or communications standard(s). -
FIGS. 2 and 3 are schematics illustrating a process of verifying a user's identity, according to more exemplary embodiments. Here theverification application 34 may calculate a score when comparing therecent location information 40 to thehistorical location information 42. AsFIG. 2 illustrates, theverification server 22 may first receive a request to verify an identity (Step 50). The request may originate from any person, such as a third party restaurant, business, or other merchant that wishes to verify the user of thedevice 20. The request, additionally or alternatively, may be automatically generated by thedevice 20 and/or theverification server 22 to enable or ensure periodic verifications and/or to ensure that recent verifications are always available. When theverification server 22 receives the request, theverification application 34 may query for recent and/or historical location information (Step 52). When the location information is stale (that is, older than some predetermined time), theverification application 34 may send a request for updated location information (Step 54). Thedevice 20 responds and sends current or recent location information (Step 56). Theverification application 34 compares the recent location information to the historical location information (Step 58). - The
verification application 34 accesses a scoring algorithm (Step 60). The scoring algorithm numerically evaluates how well the recent movements of thedevice 20 match the historical location information, as defined by the scoring algorithm. The scoring algorithm may be any simple or complex formula, relationship, pattern matching process, string equation, or logical comparison. The scoring algorithm, however, may have any structure and/or language, such as MathML or OpenMath. In addition, the third party requestor may supply the scoring algorithm in the form of mobile executable code (e.g., Java byte code). The third party requestor may thus specify the scoring algorithm, thus allowing the requestor to determine how strictly the current user's identity is verified. The complexity of the third party's scoring algorithm, however, may be restricted to not substantially hinder the performance of theverification application 34 or theverification server 22 itself. So theverification application 34 may inspect the scoring algorithm and estimate its complexity. Theverification application 34 may measure the bit or byte length of the scoring algorithm and compare to a threshold size. Theverification application 34 may inspect the scoring algorithm for terms, mathematical operations/operands, or mathematical functions that indicate complexity. If such indicators are found, theverification application 34 could reject the third party's scoring algorithm. Theverification application 34 may even utilize multiple scoring algorithms and select one or more of the outcomes. - Whatever the scoring algorithm, the
verification application 34 calculates a score (Step 62). The score is a measure of identity. If multiple scoring algorithms are used, a score may be calculated for each algorithm. The best score(s) may be chosen for identity verification, or the multiple scores may be combined and/or weighted to produce an overall, final score. - The process continues with
FIG. 3 . Theverification application 34 may compare the score(s) to one or more threshold scores (Step 64). The threshold score may represent a necessary score at which the identity of the user may be verified. When the recent movements match the historical location information, then the score may indicate the user matches the historical user. If there is little or no difference between the recent movements and the historical location information, then the threshold score may be satisfied and the identity of the user is verified (Step 66). When the location information unfavorably compares to the historical location information, then the threshold score may not be satisfied and theverification application 34 may decline to verify the identity of the user of the device (Step 68). Theverification application 34 may then send a message to thedevice 20 that verifies, or fails to verify, the identity of the user (Step 70). Theverification application 34 may additionally or alternatively send the message to the third party requestor. - The threshold score may be configurable. The threshold score represents some configurable score that is required to verify the identity of the user. The threshold score is preferably stored in the
memory 36 of theverification server 22, but the threshold score may be remotely accessed (via thecommunications network 24 shown inFIG. 1 ). The threshold score may even be supplied by the verification requestor (e.g., a third party merchant). A user of thedevice 20, for example, may establish a strict threshold score so that even slight variations (between the recent movements and the historical location information) result in a failed verification. A more lax threshold score may verify the user despite location differences. Similarly, the third party requestor may specify a strict threshold score to reduce the chances of fraudulent purchases, transactions, and other activities. -
FIG. 4 is a schematic illustrating another process of verifying a user's identity, according to even more exemplary embodiments. Here theverification application 34 may access rules that determine how strictly the location information is compared to the historical location information. Theverification server 22 again receives a request to verify an identity (Step 80). Theverification application 34 queries for recent and/or historical location information (Step 82). Theverification application 34 retrieves a set of rules (Step 84) and compares the recent location information to the historical location information, according to the set of rules (Step 86). Theverification application 34 may access the scoring algorithm (Step 88), calculate the score (Step 90), and compare the score to the threshold score (Step 92). Theverification application 34 may then send a message that verifies, or fails to verify, the identity of the user (Step 94). - According to exemplary embodiments, the set of rules defines how recent location information is compared to the historical location information. The set of rules may be stored in the
memory 36 of theverification server 22, yet the set of rules may be remotely accessed (via thecommunications network 24 shown inFIG. 1 ). The set of rules may also be supplied by the verification requestor (e.g., attached to or specified by the verification request illustrated asStep 80 inFIG. 4 ). The set of rules, for example, may establish a logical comparison of location information for one or more different intervals of time. Location information is retrieved for each specified interval of time, and then the location information is compared. Theverification application 34 may compare individual locations (or “waypoints”), or theverification application 34 may compare routes (e.g., a series of locations or waypoints). Theverification application 34 may additionally or alternatively compare the time spent at locations and/or en routes. Whatever interval(s) of time are specified, theverification application 34 gathers the corresponding location information, according to the set of rules. - The set of rules may specify two different intervals of time. The set of rules, for example, may specify that the
verification application 34 compare the previous week's location information to the past ten weeks of the historical location information. A first interval of time, then, would represent the previous seven days, while a second interval of time would represent the previous seventy days. Theverification application 34 collects location information for the previous seven days and for the previous seventy days. The previous week's location information is then compared to the past ten weeks of the historical location information. The set of rules may specify any interval or length of time in any unit of measurement (e.g., seconds, minutes, hours, days, weeks, months, years). In some implementations, the comparison of a shorter interval with a longer interval may include comparing the shorter interval to multiple instances of similar intervals existing within the longer interval. - The set of rules may also specify particular dates. The set of rules, for example, may specify that location information for Monday and Tuesday is compared with the previous two weeks of historical location information. The set of rules may specify that location information for Monday and Tuesday is compared to historical location information for each Monday and Tuesday during the previous six months. The set of rules may specify that location information for today from noon to 6 PM is compared to historical location information for each previous noon to 6 PM over the last four months. The set of rules, in short, may specify different intervals of time by date(s).
- The set of rules may also specify a strict or lax comparison. The set of rules, for example, may specify that the same location must be observed in all specified intervals of time. The set of rules may more strictly require that the same location be observed at the same or nearly same time in each interval of time. The set of rules may strictly require the same route (e.g., the same series of location information) be observed for each interval of time. If the user historically takes the same route, then the set of rules may specify that that same route be observed to verify the user's identity. If the user historically has the same historical location information for each Tuesday of the previous months, then the set of rules may require that same location information on any Tuesday in order to verify the user's identity.
- The set of rules may specify acceptable variation in location information. When the current location information is compared to the historical location information, the set of rules may limit how much difference is acceptable. The set of rules, for example, may strictly require an exact match in location information, within the accuracy of the location system (shown as
reference numeral 28 inFIG. 1 ). The set of rules may even strictly require an exact match in location information and in the time of each observed location. An exact match requirement, however, may result in excessive denials of identity. The set of rules, then, may specify a threshold radius of variation, in which current location information may be approximately matched to the historical location information. If any location information is within the threshold radius of the historical location information, then theverification application 34 may verify the user's identity. According to exemplary embodiments, the threshold radius of variation is completely configurable and may be pre-figured and/or specified by the user and/or the verification requestor. The set of rules, verification algorithms, and the threshold radius of variation may be made adaptable based on adaptation rules and parameters such as the month, week, day of week, time of day, frequency of verification requests, and/or frequency of verification denials. The set of rules may even define multiple logical comparisons and/or multiple scoring algorithms, and, according to embodiments, one or more must be matched or satisfied within the allowable threshold radius of variation. In some cases, for instance when employing multiple algorithms, multiple thresholds and/or multiple threshold radii of variation may be used. - The set of rules may also access a geographical information system or database. When the
verification application 34 compares current location information to the historical location information, geographical information may be used to augment that comparison. Theverification application 34, for example, may tolerate more variation in location information when the geographical information indicates hilly, forested, or even mountainous terrains. In such terrains, for instance, GPS location fixes may sometimes suffer in accuracy due to increased difficulty of receiving the required GPS satellite signals. The location information may even be more accurate in some terrains than in others, so the set of rules may require greater accuracy in some terrains. The geographical information may be stored in thememory 36 of theverification server 22, or the geographical information may be remotely stored in a remote database and accessed via thecommunications network 24. Geographical information, then, may be used to help compare location information and overcome or evaluate ambiguities, errors, and imprecision. -
FIG. 5 is a schematic illustrating exceptions, according to even more exemplary embodiments. Here exemplary embodiments may automatically decline to verify a user. When theverification application 34 receives thelocation information 26, theverification application 34 may query adatabase 100 of exceptions for thelocation information 26. Thedatabase 100 of exceptions stores forbiddenlocation exceptions 102 for which verification is immediately and automatically denied. That is, if thelocation information 26 matches any entry in thedatabase 100 of exceptions, then the user and/or the requestor requires immediate denial of identity verification. Thedatabase 100 of exceptions thus stores location information for which a legitimate, verified user would never be found/observed. Pornographic stores, private clubs, restricted access locations, remote islands, or any other locations at which the user should not be observed. When theverification application 34 receives an affirmative response from thedatabase 100 of exceptions, then theverification application 34 denies identity verification. -
FIG. 5 also illustratesvelocity exceptions 104. Theverification application 34 may receive, or calculate, changes in location over time (e.g., velocity). Theverification application 34 may then compare acurrent velocity 106 to anhistorical velocity 108. When thecurrent velocity 106 is faster or slower than the historical velocity 108 (perhaps over the same route), then theverification application 34 may have authority to deny verification. Moreover, thedatabase 100 ofexceptions stores velocities 104 for which verification is immediately and automatically denied. That is, if thecurrent velocity 106 is greater than thehistorical velocity 108, then an imposter may have obtained thedevice 20. If the legitimate, historical user consistently drives twenty five miles per hour in a school zone, and thecurrent velocity 106 is forty miles per hour, then an imposter may have obtained thedevice 20. If the legitimate, historical user would never fly in an airplane, and thecurrent velocity 106 is over 80 miles per hour, then an imposter may have obtained thedevice 20. When theverification application 34 calculates velocity and receives an affirmative response from thedatabase 100 of exceptions, then theverification application 34 may deny identity verification. -
FIG. 6 is a schematic illustrating presentation of an identity verification rating, according to still more exemplary embodiments. Here, when theverification application 34 scores the user's identity (based on location), theverification application 34 sends that score and/or an appropriately calculated rating based on that score to the user'sdevice 20. Theverification application 34 retrieves aset 120 of rules and compares therecent location information 40 to thehistorical location information 42. Theverification application 34 may access thescoring algorithm 122, calculate ascore 124, and compare thescore 124 to thethreshold score 126. Theverification application 34 then sends thescore 124 to the user'sdevice 20. The rating may be determined from the score if, for example, the scale of the score varies by algorithm. The score or rating may be scaled or configured to be within the range of “0” to “100,” with greater numbers having more confidence. - The user's
device 20 presents anidentity verification rating 128. Theidentity verification rating 128 is illustrated as an icon or notification that is visually presented on adisplay device 130 of the user'sdevice 20, yet theidentity verification rating 128 may also have audible features. The user'sdevice 20 has a processor 132 (e.g., “μP”), application specific integrated circuit (ASIC), or other similar device that executes a client-side verification application 134 stored inmemory 136. The client-side verification application 134 is a set of processor-executable instructions that cooperate with the verification application 34 (operating in the verification server 22) to verify the identity of the user of thedevice 20. The client-side verification application 134 instructs theprocessor 132 to receive thescore 124 and to present theidentity verification rating 128. Theidentity verification rating 128, for example, may be a numerical presentation or bar graph of the score 124 (e.g. a probability or confidence level). Theidentity verification rating 128, however, may be a simple “green” icon that indicates the user has been verified. A “red” icon may indicate that the current user is an imposter and that verification is or should be denied. The “red” icon may be accompanied by an alert, such as an audible chirp or siren sound, flashing beacon, and/or loud synthesized voice declaration (such as “This device has been stolen; bystanders please notify the police at once!”). Theidentity verification rating 128 may be any graphical, audible, or visual indicator of the user's identity verification. - The
identity verification rating 128 may be proof of identity. Because theidentity verification rating 128 is visually produced at the user'sdevice 20, the user may thus present thedevice 20 as verification of identity. Whenever a merchant, for example, requires identity verification, the user may simply and quickly produce thedevice 20 with theidentity verification rating 128 presented on thedisplay device 130. Theidentity verification rating 128 may even additionally retrieve a name, address, and driver's license number from thememory 136, and theidentity verification rating 128 may additionally present this and/or any other suitable information. When theidentity verification rating 128 is high, for example, the merchant may confidently accept the user's identity. When, however, theverification application 34 sees unusual or even suspicious location information, theidentity verification rating 128 may drop or change in value, so the merchant may be reluctant to verify the identity of the user. Additional identification, such as a physical driver's license or social security card, may then be desired and/or specifically required by the merchant. -
FIG. 7 is a schematic illustrating an alternative, centralized operating environment, according to more exemplary embodiments. Here theverification server 22 communicates withmultiple user devices 150 via thecommunications network 24. Theverification server 22 also communicates with one or more third party requestor'sdevices 152 via thecommunications network 24. Theverification application 34 operates in thecentralized verification server 22. An instance of the client-side verification application 134 operates in each of the users'devices 150. An instance of the client-side verification application 134 may also operate in the third party requestor'sdevice 152. Theverification application 34 may continuously or periodically verify the identity of any user of theuser devices 150. Alternatively or additionally, whenever a third party (such as a merchant) desires to verify the identity of a user, the third party'scorresponding device 152 may send averification request 154. Theverification request 154 includesdevice information 156 that uniquely identifies the device for which identity verification is desired. Thedevice information 156, for example, may include a machine address code, a serial number, an Internet Protocol address, or any other alphanumeric combination. When theverification application 34 receives theverification request 154, theverification application 34 queries thedatabase 38 of location information for thecurrent location information 40 and for thehistorical location information 42. Here thedatabase 38 of location information is illustrated as being remotely accessible via thecommunications network 24. Theverification application 34 compares thecurrent location information 40 with thehistorical location information 42 and scores the user's identity (as explained with reference toFIGS. 1-6 ). Theverification application 34 sends thescore 124 to the corresponding user'sdevice 20 and/or to the third party's requestingdevice 152. The user'sdevice 20 may then visually and/or audibly present theidentity verification rating 128, as above explained. Theverification application 34 may additionally or alternatively send thescore 124 to other devices associated with (or selected by) the historic user of thedevice 20. -
FIG. 8 depicts other possible operating environments for additional aspects of the exemplary embodiments.FIG. 8 illustrates that theverification application 34 and/or the client-side verification application 34 may alternatively or additionally operate within variousother devices 200.FIG. 8 , for example, illustrates that theverification application 34 and/or the client-side verification application 34 may entirely or partially operate within a set-top box (202), a personal/digital video recorder (PVR/DVR) 204, personal digital assistant (PDA) 206, a Global Positioning System (GPS)device 208, aninteractive television 210, an Internet Protocol (IP)phone 212, apager 214, a cellular/satellite phone 216, or any computer system and/or communications device utilizing a digital processor and/or a digital signal processor (DP/DSP) 218. Thedevice 200 may also include watches, radios, vehicle electronics, clocks, printers, gateways, mobile/implantable medical devices, and other apparatuses and systems. Because the architecture and operating principles of thevarious devices 200 are well known, the hardware and software componentry of thevarious devices 200 are not further shown and described. If, however, the reader desires more details, the reader is invited to consult the following sources, all incorporated herein by reference in their entirety: LAWRENCE HARTE et al., GSM SUPERPHONES (1999); SIEGMUND REDL et al., GSMAND PERSONAL COMMUNICATIONS HANDBOOK (1998); and JOACHIM TISAL , GSM CELLULAR RADIO TELEPHONY (1997); the GSM Standard 2.17, formally known Subscriber Identity Modules, Functional Characteristics (GSM 02.17 V3.2.0 (1995-01))”; the GSM Standard 11.11, formally known as Specification of the Subscriber Identity Module—Mobile Equipment (Subscriber Identity Module—ME) interface (GSM 11.11 V5.3.0 (1996-07))”; MICHEAL ROBIN & MICHEL POULIN , DIGITAL TELEVISION FUNDAMENTALS (2000); JERRY WHITAKER AND BLAIR BENSON , VIDEO AND TELEVISION ENGINEERING (2003); JERRY WHITAKER , DTV HANDBOOK (2001); JERRY WHITAKER , DTV: THE REVOLUTION IN ELECTRONIC IMAGING (1998); and EDWARD M. SCHWALB, I TV HANDBOOK : TECHNOLOGIES AND STANDARDS (2004). -
FIG. 9 is a flowchart illustrating a method of verifying identity, according to even more exemplary embodiments. A request to verify the identity of a user of a device is received (Block 300). Location information for a device is acquired (Block 302). The location information is compared to historical location information (Block 304). A set of rules is applied that determines how strictly the location information is compared to the historical location information (Block 306). Any differences between recent movements and the historical location information are scored (Block 308). The score is compared to a threshold (Block 310). When the score favorably compares to the threshold, then verify that the recent movements of the user match the historical location information (Block 312). When the location information unfavorably compares to the historical location information, then decline to verify the identity of the user of the device (Block 314). A verification message is sent that verifies, or denies, the identity of the user (Block 316). - Exemplary embodiments may be physically embodied on or in a computer-readable medium. This computer-readable medium may include CD-ROM, DVD, tape, cassette, floppy disk, memory card, and large-capacity disk (such as IOMEGA®, ZIP®, JAZZ®, and other large-capacity memory products (IOMEGA®, ZIP®, and JAZZ® are registered trademarks of Iomega Corporation, 1821 W. Iomega Way, Roy, Utah 84067, 801.332.1000, www.iomega.com). This computer-readable medium, or media, could be distributed to end-subscribers, licensees, and assignees. These types of computer-readable media, and other types not mention here but considered within the scope of the exemplary embodiments. A computer program product comprises processor-executable instructions for verifying identity.
- While the exemplary embodiments have been described with respect to various features, aspects, and embodiments, those skilled and unskilled in the art will recognize the exemplary embodiments are not so limited. Other variations, modifications, and alternative embodiments may be made without departing from the spirit and scope of the exemplary embodiments.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/710,319 US8116751B2 (en) | 2007-02-23 | 2007-02-23 | Methods, systems, and products for identity verification |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/710,319 US8116751B2 (en) | 2007-02-23 | 2007-02-23 | Methods, systems, and products for identity verification |
Publications (2)
Publication Number | Publication Date |
---|---|
US20080207220A1 true US20080207220A1 (en) | 2008-08-28 |
US8116751B2 US8116751B2 (en) | 2012-02-14 |
Family
ID=39716483
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/710,319 Expired - Fee Related US8116751B2 (en) | 2007-02-23 | 2007-02-23 | Methods, systems, and products for identity verification |
Country Status (1)
Country | Link |
---|---|
US (1) | US8116751B2 (en) |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080227471A1 (en) * | 2007-03-16 | 2008-09-18 | Ajay Dankar | Method for tracking credit card fraud |
US20100130165A1 (en) * | 2007-03-16 | 2010-05-27 | Snyder Randall A | System and method for identity protection using mobile device signaling network derived location pattern recognition |
US20100153278A1 (en) * | 2008-12-16 | 2010-06-17 | Farsedakis Lewis E | Web sites that introduce a seller to a universe of buyers, web sites that receive a buyer's listing of what he wants to buy, other introduction web sites, systems using introduction web sites and internet-based introductions |
GB2468788A (en) * | 2009-03-20 | 2010-09-22 | Validsoft | Authenticating a transaction by comparing identifiers |
US20120151560A1 (en) * | 2010-12-08 | 2012-06-14 | Lewis Farsedakis | Portable Identity Rating |
US8359631B2 (en) | 2010-12-08 | 2013-01-22 | Lewis Farsedakis | Portable identity rating |
US20140162639A1 (en) * | 2012-12-12 | 2014-06-12 | General Motors LLC and GM Global Technology Operations LLC | Cellular Device Identifier Provisioning Verification |
US20140172574A1 (en) * | 2012-12-18 | 2014-06-19 | Yahoo Japan Corporation | Information transmission device, information transmission method, and non-transitory computer-readable recording medium |
US20140187205A1 (en) * | 2007-03-16 | 2014-07-03 | Ajay Dankar | System and method for automated analysis comparing a wireless device location with another geographic location |
US20150163642A1 (en) * | 2013-12-06 | 2015-06-11 | Cellco Partnership D/B/A Verizon Wireless | Enhanced 911 for fixed wireless |
US20150242602A1 (en) * | 2014-02-24 | 2015-08-27 | Keypasco Ab | Network authentication method for secure user identity verification using user positioning information |
US20150281252A1 (en) * | 2014-03-25 | 2015-10-01 | Ryan Melcher | Data mesh based environmental augmentation |
EP2583224A4 (en) * | 2010-06-17 | 2016-04-27 | Microsoft Technology Licensing Llc | Techniques to verify location for location based services |
US9420448B2 (en) | 2007-03-16 | 2016-08-16 | Visa International Service Association | System and method for automated analysis comparing a wireless device location with another geographic location |
US9787660B2 (en) | 2014-05-22 | 2017-10-10 | Alibaba Group Holding Limited | Method, apparatus, and system for providing a security check |
US9922323B2 (en) | 2007-03-16 | 2018-03-20 | Visa International Service Association | System and method for automated analysis comparing a wireless device location with another geographic location |
US20210072029A1 (en) * | 2019-09-09 | 2021-03-11 | Caci, Inc. - Federal | Systems and methods for providing localization and navigation services |
US11257582B2 (en) * | 2008-11-25 | 2022-02-22 | Fox Factory, Inc. | Methods and apparatus for virtual competition |
US20220138882A1 (en) * | 2020-11-03 | 2022-05-05 | T-Mobile Usa, Inc. | Identity management |
US11405781B2 (en) | 2007-03-16 | 2022-08-02 | Visa International Service Association | System and method for mobile identity protection for online user authentication |
US11449850B2 (en) | 2009-01-28 | 2022-09-20 | Validsoft Limited | Card false-positive prevention |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8312033B1 (en) | 2008-06-26 | 2012-11-13 | Experian Marketing Solutions, Inc. | Systems and methods for providing an integrated identifier |
US9607336B1 (en) | 2011-06-16 | 2017-03-28 | Consumerinfo.Com, Inc. | Providing credit inquiry alerts |
US8903657B2 (en) | 2012-07-31 | 2014-12-02 | Motorola Solutions, Inc. | Systems and methods for correlating routes of mobile devices |
US9633322B1 (en) | 2013-03-15 | 2017-04-25 | Consumerinfo.Com, Inc. | Adjustment of knowledge-based authentication |
US10664936B2 (en) | 2013-03-15 | 2020-05-26 | Csidentity Corporation | Authentication systems and methods for on-demand products |
US9020754B2 (en) * | 2013-03-22 | 2015-04-28 | Here Global B.V. | Vehicle arrival prediction |
US9721147B1 (en) | 2013-05-23 | 2017-08-01 | Consumerinfo.Com, Inc. | Digital identity |
US20150012530A1 (en) * | 2013-07-05 | 2015-01-08 | Accenture Global Services Limited | Determining an emergent identity over time |
US10373240B1 (en) | 2014-04-25 | 2019-08-06 | Csidentity Corporation | Systems, methods and computer-program products for eligibility verification |
US20150310434A1 (en) * | 2014-04-29 | 2015-10-29 | Dennis Takchi Cheung | Systems and methods for implementing authentication based on location history |
US20150371221A1 (en) * | 2014-06-20 | 2015-12-24 | Ebay Inc. | Two factor authentication for invoicing payments |
US10911234B2 (en) | 2018-06-22 | 2021-02-02 | Experian Information Solutions, Inc. | System and method for a token gateway environment |
US11941065B1 (en) | 2019-09-13 | 2024-03-26 | Experian Information Solutions, Inc. | Single identifier platform for storing entity data |
Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5572221A (en) * | 1994-10-26 | 1996-11-05 | Telefonaktiebolaget Lm Ericsson | Method and apparatus for detecting and predicting motion of mobile terminals |
US6405213B1 (en) * | 1997-05-27 | 2002-06-11 | Hoyt M. Layson | System to correlate crime incidents with a subject's location using crime incident data and a subject location recording device |
US20030151524A1 (en) * | 2002-02-06 | 2003-08-14 | Clark Ronald Scott | Locator system with an implanted transponder having an organically-rechargeable battery |
US6725127B2 (en) * | 2000-05-25 | 2004-04-20 | Ebox Inc. | Package delivery system |
US20040239508A1 (en) * | 2003-06-02 | 2004-12-02 | Masao Kaneko | Position movement alarm system |
US20060020459A1 (en) * | 2004-07-21 | 2006-01-26 | Carter John A | System and method for immigration tracking and intelligence |
US20060183486A1 (en) * | 2002-03-25 | 2006-08-17 | Mullen Jeffrey D | Systems and methods for locating cellular phones and security measures for the same |
US20060208857A1 (en) * | 2003-07-31 | 2006-09-21 | Kai En Wong | Use of rfid tags and readers to automate real time alert signals in a security system |
US20060223518A1 (en) * | 2005-04-04 | 2006-10-05 | Haney Richard D | Location sharing and tracking using mobile phones or other wireless devices |
US20070082706A1 (en) * | 2003-10-21 | 2007-04-12 | Johnson Controls Technology Company | System and method for selecting a user speech profile for a device in a vehicle |
US20070087834A1 (en) * | 2002-06-12 | 2007-04-19 | Igt | Casino patron tracking and information use |
US20070208861A1 (en) * | 2006-03-02 | 2007-09-06 | Zellner Samuel N | User preference interpretation |
US20070268138A1 (en) * | 2004-08-26 | 2007-11-22 | Chung Kevin K | Object monitoring, locating, and tracking system and method employing rfid devices |
US20080032719A1 (en) * | 2005-10-01 | 2008-02-07 | Outland Research, Llc | Centralized establishment-based tracking and messaging service |
US20080157966A1 (en) * | 2006-12-27 | 2008-07-03 | Motorola, Inc. | Monitoring for radio frequency enabled items based on activity profiles |
-
2007
- 2007-02-23 US US11/710,319 patent/US8116751B2/en not_active Expired - Fee Related
Patent Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5572221A (en) * | 1994-10-26 | 1996-11-05 | Telefonaktiebolaget Lm Ericsson | Method and apparatus for detecting and predicting motion of mobile terminals |
US6405213B1 (en) * | 1997-05-27 | 2002-06-11 | Hoyt M. Layson | System to correlate crime incidents with a subject's location using crime incident data and a subject location recording device |
US6725127B2 (en) * | 2000-05-25 | 2004-04-20 | Ebox Inc. | Package delivery system |
US20030151524A1 (en) * | 2002-02-06 | 2003-08-14 | Clark Ronald Scott | Locator system with an implanted transponder having an organically-rechargeable battery |
US20060183486A1 (en) * | 2002-03-25 | 2006-08-17 | Mullen Jeffrey D | Systems and methods for locating cellular phones and security measures for the same |
US20070087834A1 (en) * | 2002-06-12 | 2007-04-19 | Igt | Casino patron tracking and information use |
US20040239508A1 (en) * | 2003-06-02 | 2004-12-02 | Masao Kaneko | Position movement alarm system |
US20060208857A1 (en) * | 2003-07-31 | 2006-09-21 | Kai En Wong | Use of rfid tags and readers to automate real time alert signals in a security system |
US20070082706A1 (en) * | 2003-10-21 | 2007-04-12 | Johnson Controls Technology Company | System and method for selecting a user speech profile for a device in a vehicle |
US20060020459A1 (en) * | 2004-07-21 | 2006-01-26 | Carter John A | System and method for immigration tracking and intelligence |
US20070268138A1 (en) * | 2004-08-26 | 2007-11-22 | Chung Kevin K | Object monitoring, locating, and tracking system and method employing rfid devices |
US20060223518A1 (en) * | 2005-04-04 | 2006-10-05 | Haney Richard D | Location sharing and tracking using mobile phones or other wireless devices |
US20080032719A1 (en) * | 2005-10-01 | 2008-02-07 | Outland Research, Llc | Centralized establishment-based tracking and messaging service |
US20070208861A1 (en) * | 2006-03-02 | 2007-09-06 | Zellner Samuel N | User preference interpretation |
US20080157966A1 (en) * | 2006-12-27 | 2008-07-03 | Motorola, Inc. | Monitoring for radio frequency enabled items based on activity profiles |
Cited By (63)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9848298B2 (en) | 2007-03-16 | 2017-12-19 | Visa International Service Association | System and method for automated analysis comparing a wireless device location with another geographic location |
US10776784B2 (en) | 2007-03-16 | 2020-09-15 | Visa International Service Association | System and method for automated analysis comparing a wireless device location with another geographic location |
US9432845B2 (en) * | 2007-03-16 | 2016-08-30 | Visa International Service Association | System and method for automated analysis comparing a wireless device location with another geographic location |
US9420448B2 (en) | 2007-03-16 | 2016-08-16 | Visa International Service Association | System and method for automated analysis comparing a wireless device location with another geographic location |
US20140187205A1 (en) * | 2007-03-16 | 2014-07-03 | Ajay Dankar | System and method for automated analysis comparing a wireless device location with another geographic location |
US8280348B2 (en) * | 2007-03-16 | 2012-10-02 | Finsphere Corporation | System and method for identity protection using mobile device signaling network derived location pattern recognition |
US10354253B2 (en) * | 2007-03-16 | 2019-07-16 | Visa International Service Association | System and method for identity protection using mobile device signaling network derived location pattern recognition |
US8831564B2 (en) | 2007-03-16 | 2014-09-09 | Finsphere Corporation | System and method for identity protection using mobile device signaling network derived location pattern recognition |
US10776791B2 (en) | 2007-03-16 | 2020-09-15 | Visa International Service Association | System and method for identity protection using mobile device signaling network derived location pattern recognition |
US9603023B2 (en) | 2007-03-16 | 2017-03-21 | Visa International Service Association | System and method for identity protection using mobile device signaling network derived location pattern recognition |
US9922323B2 (en) | 2007-03-16 | 2018-03-20 | Visa International Service Association | System and method for automated analysis comparing a wireless device location with another geographic location |
US20080227471A1 (en) * | 2007-03-16 | 2008-09-18 | Ajay Dankar | Method for tracking credit card fraud |
US10669130B2 (en) | 2007-03-16 | 2020-06-02 | Visa International Service Association | System and method for automated analysis comparing a wireless device location with another geographic location |
US20100130165A1 (en) * | 2007-03-16 | 2010-05-27 | Snyder Randall A | System and method for identity protection using mobile device signaling network derived location pattern recognition |
US8374634B2 (en) * | 2007-03-16 | 2013-02-12 | Finsphere Corporation | System and method for automated analysis comparing a wireless device location with another geographic location |
US11405781B2 (en) | 2007-03-16 | 2022-08-02 | Visa International Service Association | System and method for mobile identity protection for online user authentication |
US20220172817A1 (en) * | 2008-11-25 | 2022-06-02 | Fox Factory, Inc. | Methods and apparatus for virtual competition |
US12033739B2 (en) | 2008-11-25 | 2024-07-09 | Fox Factory, Inc. | Methods and apparatus for virtual competition |
US11961602B2 (en) | 2008-11-25 | 2024-04-16 | Fox Factory, Inc. | Methods and apparatus for virtual competition |
US11875887B2 (en) | 2008-11-25 | 2024-01-16 | Fox Factory, Inc. | Methods and apparatus for virtual competition |
US11869651B2 (en) | 2008-11-25 | 2024-01-09 | Fox Factory, Inc. | Methods and apparatus for virtual competition |
US11257582B2 (en) * | 2008-11-25 | 2022-02-22 | Fox Factory, Inc. | Methods and apparatus for virtual competition |
US20100153278A1 (en) * | 2008-12-16 | 2010-06-17 | Farsedakis Lewis E | Web sites that introduce a seller to a universe of buyers, web sites that receive a buyer's listing of what he wants to buy, other introduction web sites, systems using introduction web sites and internet-based introductions |
US11449850B2 (en) | 2009-01-28 | 2022-09-20 | Validsoft Limited | Card false-positive prevention |
GB2468788A (en) * | 2009-03-20 | 2010-09-22 | Validsoft | Authenticating a transaction by comparing identifiers |
US20170180337A1 (en) * | 2010-06-17 | 2017-06-22 | Microsoft Technology Licensing, Llc | Techniques to verify location for location based services |
EP2583224A4 (en) * | 2010-06-17 | 2016-04-27 | Microsoft Technology Licensing Llc | Techniques to verify location for location based services |
US9626696B2 (en) | 2010-06-17 | 2017-04-18 | Microsoft Technology Licensing, Llc | Techniques to verify location for location based services |
US10554638B2 (en) * | 2010-06-17 | 2020-02-04 | Microsoft Technology Licensing, Llc | Techniques to verify location for location based services |
US8359631B2 (en) | 2010-12-08 | 2013-01-22 | Lewis Farsedakis | Portable identity rating |
US8966650B2 (en) * | 2010-12-08 | 2015-02-24 | Lewis Farsedakis | Portable identity rating |
US20120151560A1 (en) * | 2010-12-08 | 2012-06-14 | Lewis Farsedakis | Portable Identity Rating |
US8646037B2 (en) | 2010-12-08 | 2014-02-04 | Lewis Farsedakis | Portable identity rating |
US20130219475A1 (en) * | 2010-12-08 | 2013-08-22 | Lewis Farsedakis | Portable identity rating |
US8464358B2 (en) * | 2010-12-08 | 2013-06-11 | Lewis Farsedakis | Portable identity rating |
US9055025B2 (en) * | 2012-12-12 | 2015-06-09 | General Motors Llc | Cellular device identifier provisioning verification |
US20140162639A1 (en) * | 2012-12-12 | 2014-06-12 | General Motors LLC and GM Global Technology Operations LLC | Cellular Device Identifier Provisioning Verification |
US20140172574A1 (en) * | 2012-12-18 | 2014-06-19 | Yahoo Japan Corporation | Information transmission device, information transmission method, and non-transitory computer-readable recording medium |
US9544739B2 (en) * | 2013-12-06 | 2017-01-10 | Cellco Partnership | Enhanced 911 for fixed wireless |
US20150163642A1 (en) * | 2013-12-06 | 2015-06-11 | Cellco Partnership D/B/A Verizon Wireless | Enhanced 911 for fixed wireless |
US9680841B2 (en) * | 2014-02-24 | 2017-06-13 | Keypasco Ab | Network authentication method for secure user identity verification using user positioning information |
US20150242602A1 (en) * | 2014-02-24 | 2015-08-27 | Keypasco Ab | Network authentication method for secure user identity verification using user positioning information |
US9886710B2 (en) * | 2014-03-25 | 2018-02-06 | Ebay Inc. | Data mesh visualization |
US11100561B2 (en) | 2014-03-25 | 2021-08-24 | Ebay Inc. | Data mesh visualization |
US12033204B2 (en) | 2014-03-25 | 2024-07-09 | Ebay Inc. | Device ancillary activity |
US11657443B2 (en) | 2014-03-25 | 2023-05-23 | Ebay Inc. | Data mesh based environmental augmentation |
US9576312B2 (en) | 2014-03-25 | 2017-02-21 | Ebay Inc. | Data mesh-based wearable device ancillary activity |
US11120492B2 (en) | 2014-03-25 | 2021-09-14 | Ebay Inc. | Device ancillary activity |
US11210723B2 (en) | 2014-03-25 | 2021-12-28 | Ebay Inc. | Data mesh based environmental augmentation |
US10453111B2 (en) | 2014-03-25 | 2019-10-22 | Ebay Inc. | Data mesh visualization |
US20150281252A1 (en) * | 2014-03-25 | 2015-10-01 | Ryan Melcher | Data mesh based environmental augmentation |
US10719866B2 (en) | 2014-03-25 | 2020-07-21 | Ebay Inc. | Complementary activity based on availability of functionality |
US11900437B2 (en) | 2014-03-25 | 2024-02-13 | Ebay Inc. | Data mesh based environmental augmentation |
US10304114B2 (en) * | 2014-03-25 | 2019-05-28 | Ebay Inc. | Data mesh based environmental augmentation |
US20150278912A1 (en) * | 2014-03-25 | 2015-10-01 | Ryan Melcher | Data mesh based zero effort shopping |
US11810178B2 (en) | 2014-03-25 | 2023-11-07 | Ebay Inc. | Data mesh visualization |
US20150279069A1 (en) * | 2014-03-25 | 2015-10-01 | Ryan Melcher | Data mesh visualization |
US10798081B2 (en) | 2014-05-22 | 2020-10-06 | Alibaba Group Holding Limited | Method, apparatus, and system for providing a security check |
US10158621B2 (en) | 2014-05-22 | 2018-12-18 | Alibaba Group Holding Limited | Method, apparatus, and system for providing a security check |
US9787660B2 (en) | 2014-05-22 | 2017-10-10 | Alibaba Group Holding Limited | Method, apparatus, and system for providing a security check |
US20210072029A1 (en) * | 2019-09-09 | 2021-03-11 | Caci, Inc. - Federal | Systems and methods for providing localization and navigation services |
US20220138882A1 (en) * | 2020-11-03 | 2022-05-05 | T-Mobile Usa, Inc. | Identity management |
US12067638B2 (en) * | 2020-11-03 | 2024-08-20 | T-Mobile Usa, Inc. | Identity management |
Also Published As
Publication number | Publication date |
---|---|
US8116751B2 (en) | 2012-02-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8116751B2 (en) | Methods, systems, and products for identity verification | |
US9853984B2 (en) | Methods, systems, and products for identity verification | |
US10621852B2 (en) | Systems and methods for utilizing information to monitor targets | |
US11250688B2 (en) | Systems and methods for monitored individual progression processing | |
US11546325B2 (en) | Proximity-based system for object tracking | |
KR101392651B1 (en) | Identity verification using location over time informaion | |
CN107209819B (en) | Pass through the assets accessibility continuously identified to mobile device | |
US9990831B2 (en) | Home incarceration confirmation system | |
US8493219B2 (en) | Systems and methods for adaptive monitoring and tracking of a target having a learning period | |
KR100902199B1 (en) | Authentication apparatus and method for controlling the authentication apparatus, electronic device provided with authentication apparatus, program for controlling authentication apparatus, and recording media storing the program | |
US9265450B1 (en) | Proximity-based system for object tracking and automatic application initialization | |
US10109173B2 (en) | Person of interest location confirmation system | |
CN106416339B (en) | The method and system of dynamic authorization | |
JPH1127751A (en) | Personally authenticating system | |
JP2018136773A (en) | Information processing system, portable terminal, server device, information processing method and program | |
US20220051552A1 (en) | Systems and Methods for Multi-Point Check-In Communication and Processing | |
JP2019017661A (en) | Information processing device, information processing method, and computer program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: BELLSOUTH INTELLECTUAL PROPERTY CORPORATION,DELAWA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:AARON, JEFFREY A.;REEL/FRAME:019044/0577 Effective date: 20070215 Owner name: BELLSOUTH INTELLECTUAL PROPERTY CORPORATION, DELAW Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:AARON, JEFFREY A.;REEL/FRAME:019044/0577 Effective date: 20070215 |
|
ZAAA | Notice of allowance and fees due |
Free format text: ORIGINAL CODE: NOA |
|
ZAAB | Notice of allowance mailed |
Free format text: ORIGINAL CODE: MN/=. |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20240214 |